Ihave setup a SSM On-Prem satellite server to manage the Smart Licenses on our internal Network. I have been able to get it to publish smart licenses to my firewalls that had no license on them. I am currently attempting to connect my ISR 1100(17.3) Series routers to the server in order to convert their traditional licenses into smart licenses.
I asked around some more and was informed that SSM On-Prem doesn't support the new CSLU at this time which is most likely causing my issue when using version 17.3.3 IOS XE. I went ahead and backported to 16.12.05 and my device registered on the first try with no configuration changes. I am currently starting the DLC process to convert the license via my Satellite Server.
If anyone has any idea on how long it normally takes or if I need to ReSync my Server to complete please let me know. However the original question has been answered so I'll be marking this as the solution.
Does anyone know about a future release that allow the use of 17.3+ with SSM On-Prem ? (my customer would prefer a Linux VM rather than the CSLU Windows app, even wit the CentOS 7 end-of-support approaching)
A Satellite server registers with Red Hat Subscription Management, mirrors all relevant software like security errata and bug fixes, and provides this together with locally added software and configuration to the attached servers.
The managed hosts register against the local Satellite server and access the provided resources like software packages, patches, configuration, etc. while they also provide information about the current health state of the server to the Satellite[3]
Satellite generally operates in "connected" mode, registering directly with the RHN and downloading relevant software into Satellite's software channels. The organisation's hosts then register against the local Satellite server, instead of directly against Red Hat Network.
For secure deployments, Satellite can operate in a "Disconnected" mode, where updates are downloaded directly from Red Hat via an Internet connected machine and then uploaded into Satellite or a local offline RHN proxy.
Satellite offers numerous methods for deploying hosts, including simple kickstart, bare metal install and re-imaging. Current versions of Satellite support kickstart using Cobbler as an underlying framework. PXE Boot, and Koan are methods that can be used to implement bare metal installs and re-imaging of hosts.
Satellite can provide monitoring of software and systems via probes. These probes periodically explore the target host and send alerts if the probes do not get the correct replies, or if the replies fall outside of some specified range.
A primary purpose of earlier versions of Satellite was to allow organizations to utilize the benefits of Red Hat Network (RHN) without having to provide public Internet access to their servers or other client systems.[12] Later version of the tool have developed increased functionality.
The Lifecycle of Red Hat Satellite 6 is recorded at the Red Hat Satellite and Proxy Server Life Cycle which is updated as required, with future events on a bona fide basis.[25] When viewed in August 2019, Red Hat didn't indicate any date for end of support.
The Lifecycle of Red Hat Satellite 5 is recorded at the Red Hat Satellite and Proxy Server Life Cycle which is updated as required, with future events on a bona fide basis.[25] When viewed in March 2017 Red Hat indicated:
Few things seemed to be causing an issue. Rather than use the ip address of the sat server within the integration tab of FMC, we used the domain name (ensure dns entry is created). Also used port 443 when pointing the FMC to the SS URL. I was using port 8443, same as i used for https link, but seems 443 is used for the communication between actual SS and FMC.
Previously, when using yum to update or install packages on the Satellite base operating system might also update the packages related to Red Hat Satellite and resulted in system inconsistency. With this release, Red Hat Satellite prevents users from installing and updating packages with yum.
And no, satellite-installer --upgrade should not change the version number of your satellite installation. It is used to run checks for issues, to conform with the currently installed version, restart services etc. But you shouldn't run it by itself, use satellite-maintain packages update and let it take care of itself.
One of my Redhat servers can't see any repositorys after registering with our Satellite server. I do have to say this Satellite server is newly setup and the newest Version -> Satellite Server 6 on RedHat 7.1. But so far all other servers could see all the repositorys after the registration.
On Satellite Server it looks exactly like all the others that have registered. The only difference is, that this client is a VM on a KVM Host instead of an VM on a VMware Host. Google search didn't bring up anything helpful beyond that it is fixed on newer Versions, which i am already on. So i am hoping for suggestions!
Is there a way to integrate with the RedHat Linux Satellite server system management software.
I am looking to import details of packaged software to enrich the Flexera data. There is a similar integration available with Microsoft SCCM.
@tmcquin - Flexera does not have an built-in/productized adapters to import inventory from RedHat Linux Satellite. Below are a couple of threads in the Community where some customers have implemented a custom solution for this. Interesting that there is a comment or 2 that states the the inventory from the Flexera Agent is more complete and accurate than the data in RedHat Satellite.
I need to evaulate the options for an Internet connected Client Passive Monitoring towards an Internet Facing DMZ Satellite Icinga Server. So the Client can reach the Internet Satellite, but the Internet Satellite cannot reach the Client.
Communication should be secure, so a Icinga API Call with credentials in the Request is not an option. What Setup would you use?
I read about NSClient++ that it can encrypt communication and do passive checks. The counterpart NSCA Server, what can write to the icinga2.cmd pipe file, when running on the Icinga Master Server. But how can I make this Internet DMZ setup work, when the NSCA Server runs on an Internet Connected Server and not on the Icinga Master? Do you have any best practices, recommendations?
Good Day Mr. Sommer,
thank you for the reply. We would have many 100s of clients to report problems back to the Internet facing Satellite from many locations in a passive way. Setting up a satellite is like expanding the DMZ domain I believe. Can the Icinga agent run as a passive agent? I tried to set it passively with no event handler to not have the satellite in the zones file, but then it never communicates back. So to do passive monitoring and no active checks on the Icinga side, is the Icinga agent sufficient? Or I do need NSClient++ with NSCA Server and somehow connection to the Icinga Master to update the status.
Or to go down the Powershell Icinga API Request path, I need to encrypt the communication in .Net just like the Icinga Agent and NSClient++ does it?
Thank you,
Regards
Ferenc
By default checks executed at an agent are scheduled by its parent (in you case the DMZ satellite). You could configure an agent in a way the hey itself is scheduling the checks but this is tricky and only supported for Linux.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The cloud-based Cisco Smart Software Manager allows you to view the installed base via the Internet. Although the Internet connection is secured, encrypted, and protected by password, some organizations may not want to manage their installed base with a direct Internet connection. To address this security concern, Cisco Smart Licensing model offers the Smart Software Manager satellite software. You can deploy the software, in a virtual machine, in your premise.
Step 2. On the FMC, navigate to System > Integration > Smart Software Sattelite. Select the Connect to Cisco Smart Sattelite Server and enter the URL gathered in Step 1.
I have a small server (VM) with Home Assistant runnning in my basement. I also have a Zigbee USB stick (CC2531) connected to the server and it works fine. However, there is no chance I can extend the range of the CC2531 to my appartment where most of the Zigbee devices are. This would require many repeaters in the stair case which is not really an option.
3a8082e126